Monday, September 25, 2017

Aeronautical Phishing Campaign Targets Transportation

TLP AMBER ANNOUNCEMENT:

Several email accounts were identified as part of an apparently unsuccessful phishing attack on several transportation related organizations. These email addresses were targeted in a phishing campaign, but the intended victims did not receive the phishing message due to a rate limit on the attacker’s email account. While the phishing message body was not observed, the subject line of the message was “Court Notice,” indicating the lure to be legal themed. The unsuccessful phishing attack took place on 15 January 2017. Monitoring of the keylogger data is ongoing, however, Wapack Labs has no further information at this time...READ MORE

Wapack Labs has cataloged and reported phishing attacks and credential theft in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

This TLP AMBER report is available only to Red Sky Alliance members.

New Tor Forum Recruiting Members

On 21 September 2017, Wapack labs observed a new tor based forum. The discovery was made while monitoring another space where members post and review dark web markets. The forum is recently new and has three main discussion sections within the forum: Drugs, Fraud, and General. With the forum recently opening for registration, the number of members is likely to grow. If members from other forums have migrated to the new forum, it has potential to become a reliable replacement market on the dark web. Wapack Labs will monitor the new forum and report on any activities affecting Red Sky Alliance members...READ MORE 

Wapack Labs has cataloged and reported extensively on Tor forums and markets in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

TOR "Skimmer Shop"


On 20 September 2017, Wapack Labs observed a Tor site selling a variety of credit card skimming devices. The owners of the Tor site claim to produce and modify all the products in their own workshops, which are purported to be located in the U.S. and Europe. The website states the business began in early 2015 and now consists of eleven (11) technically trained employees. The skimmer shop sells a variety of skimmers based on the shopper’s interests. The website presents various skimmer sections: ATM, gas pump, GSM (Global System for Mobile communication) receivers, POS, RFID, readers, and other skimmer accessories. Prices range from $800.00 USD to $1800.00 USD, depending on the skimmer wanted. Wapack Labs will continue to monitor this dark net skimmer shop in attempt to identify and monitor the threat actors and their activities...READ MORE

Wapack Labs has cataloged and reported extensively on Tor network shops in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

Rogue Money Shredders

On 15 September 2017, Wapack Labs observed a new Tor onion involving rogue, foreign money shredders. They claim to be apart of a large network of shredders who devalue Swiss Franc currency by re-circulating, or converting, the Francs into other currencies: U.S. Dollars (USD), Euro (EUR), and the British Pound (GBP). The hard currency that is to be shredded must be deteriorated, have holes, or is a beyond a specific date - laundering only small amounts at a time. In order to procure the cash, they claim to use anonymous bitcoin bribes and violent threats. They state that the currency used is legitimate and legal; warning counterfeit currency is illegal. The legitimacy of their hard currency product(s) is unknown. Wapack Labs will continue to research the groups' capabilities and attempt to identify the actors involved in this currency operation...READ MORE

Wapack Labs has cataloged and reported extensively on Tor forums and money laundering in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

Monday, September 18, 2017

Carding Forum Observation

On 15 September 2017, Wapack Labs observed a carding forum advertising services on numerous other carding forums. In addition to selling stolen credit cards (CCs), the forum's database contains thousands of CCs on a global scale. Meta-data and screenshots from several online videos point to the threat actor being from Russia. Wapack Labs will continue to monitor the forum in order to identify the Tactics, Techniques, and Procedures (TTPs) and the persona operating the carding forum.

Wapack Labs has cataloged and reported extensively on Russia and carding forums in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

Saturday, September 16, 2017

New from Wapack Labs! Ridiculously Simple… RiskWatch!

Ridiculously simple is going to be my mantra. Wapack Lab's RiskWatch makes monitoring threat Ridiculously Simple. Define Ridiculously Simple you say?

We can do it for you, or you can do it yourself.

For the individual: Sign in, enter an email. That domain gets checked and monitored. When we see something, you get a report. Simple right?

RiskWatch tally's the number of times any of domains, IP, or domains are seen in our intelligence. If it is, a report is generated and you get an email.

When the recipient of one of our emails logs in (for free), they'll see a dashboard that will give them enough information to fix the problem. For a small fee (starting at $9 per month) the victim can sign up for a detailed look, including raw logs and a notification service.

Think credit monitoring, but we're watching for malicious activity targeting you.

For your company: Today, our analysts screen thousands of companies. When we find issues, we'll enter a point of contact and you'll get the report. Fix away. Interested in having one of these in your own company? Use it for reporting security concerns, risks, threats to your suppliers? Partners? Easy.  Interested? Drop us a note. We're working on that console as we speak.  We'll call you when we're ready.

I was told "think Equifax report".

As of this morning, we've sent out over 1300 suspicious activity reports to individual users in the last two days.  Received one? No sweat.  Sign in. We'll build your report on the fly.

Want to be proactive? Sign up on the site. If we see something, we'll tell you!

Simple right?

RiskWatch is Patent Pending.

Tuesday, September 12, 2017

Warhorse Botnet and Attack Framework

In August 2017, Wapack Labs uncovered a new botnet leveraging a recently released attack framework dubbed "Warhorse". The bots were observed delivering the GlobeImposter malware to numerous targets including those in the government, military, telecommunications, and energy sectors. Javascript downloaders such as Warhorse have become a popular delivery mechanism for multiple malware campaigns. The speed by which Warhorse was adopted by cyber criminals is notable with the campaign described in this report taking place only a few days after the project appeared on Github. While Warhorse currently has an above average detection ratio on VirusTotal, it is still undetected by several major anti-virus vendors. Furthermore, since it is likely that the delivery infrastructure is part of a larger botnet then there is a high probability the bots are being leveraged in other attacks. This report provides an early warning on this new botnet and details on the Warhorse attack framework...READ MORE

Wapack Labs has cataloged and reported extensively on botnets and malware in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

Monday, September 11, 2017

Profile: Arrested Chinese Cyber Actor Yu Pingan

TLP AMBER ANNOUNCEMENT: 

On 22 August 2017, a Chinese national named Yu Pingan was arrested and charged with cyber intrusions into four U.S. corporations between 2011 and 2014 that included the use of Sakula malware, known for its use in the major breaches of Anthem patient records and the Office of Personnel Management (OPM). Yu Pingan operates under the principle persona “Goldsun.” Analysts believe (high confidence) that he is in fact the Goldsun that was active at the Chinese hacker website Xfocus.net from 2004 to 2009. He is credited with and likely authored several pieces of malware that he posted during this period. His real identity remained unknown, but email addresses in some of his posts correspond to other accounts identified in the charges that led to his arrest. The charges against Yu Pingan do not identify any organization he was working for nor any connection to the Chinese government. Wapack Labs believes with medium confidence that Yu is affiliated with the Chinese civilian hacker group Wekby. The Chinese Government has not issued any statements and there has been no coverage of his arrest in official media...READ MORE

Wapack Labs has cataloged and reported extensively on China, Wekby, APT, and cyber intrusions in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

This TLP AMBER report is available only to Red Sky Alliance members.

Adopting Maritime Cryptocurrency Requires Due Diligence and Caution

The New “maritime cryptocurrency” – the TEU (the maritime Twenty-foot Equivalent Unit) tokens on Ethereum, were recently announced. The promotors, ETH Smart Contract Tech Limited, started a fundraising token sale on 16 August 2017. It is issued by 300cubits; a startup out of Hong Kong, China. Blockchain is being tested in different fields, from financing to transportation. But this new technology poses many risks, to include: programming mistakes on many levels; backup requirements; built-in irreversibility and so-called 51% attacks that may reverse transactions; intentional fraudulent token fundraising and poorly designed business models; price volatility; legal complications and changes to laws; and hacking incidents. The TEU tokens specifically share many of these risks, some of which are mentioned in the TEU terms, and some which are not. Nevertheless, the TEU partial adoption cannot be completely ruled out as of this writing...READ MORE

Wapack Labs has cataloged and reported extensively on cryptocurrency and maritime security issues in the past. An archive of related reporting can be found in the Red Sky Alliance portal.